Analysis

  • max time kernel
    140s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    24-08-2024 19:25

General

  • Target

    bf3f6ce0cb87cb5a3f7cf80619fb3440_JaffaCakes118.html

  • Size

    130KB

  • MD5

    bf3f6ce0cb87cb5a3f7cf80619fb3440

  • SHA1

    bf249bae2a23681286951c8a8879d78e76460d7d

  • SHA256

    311274148536bed431d735389559bbf56898e2dcda54578a4b1c94ad655c55de

  • SHA512

    07c01ba9568a9614adf706d06ff83be5b6b8e546e408f38aaa994a9989bcc3f70618c02113874e8b4879475d9092e6745166d9df6d4747e6db0f2c35bedb21e3

  • SSDEEP

    1536:SEu9IMyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dJ:SECbyfkMY+BES09JXAnyrZalI+YL

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bf3f6ce0cb87cb5a3f7cf80619fb3440_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2268
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2268 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2224

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ae76a6d05476999aeb813d9595dde04c

    SHA1

    a5224c96ca2e782828580284a6978e655dd8a597

    SHA256

    b99966f0d3da7fb8ae3499b628965ecf05f8fb5fd5ab2149879d97f864c2629b

    SHA512

    8d7a64f455badccde9fb2e23fc4735d09607f4f0879a3460376502a85914315d4baa2c7ae2dd2a95052958fc570efaa4003ebe3e8e595e7cf01d4b6f282be6e0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2bb6d3a06fea177907e8cce0a61e2c13

    SHA1

    88b7536fb8aead1d811b5fe1507b92d645ba80cf

    SHA256

    0b5b6d3b9df3a45305479e3935c65fdc40f84d0943899e45cf54c70c0cdee785

    SHA512

    69d570560b124ba60d20013df2cc28143dbcabbb46e31e06c8f74a53350291b2cec520f0d499a1cff85c5896431e374abc53721c90fc28f863c27881be608ff3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ea231fb4c67988dfcef7baef3d111ebb

    SHA1

    e55b66a10db1578fc579fc98ee9f52ed973f50c6

    SHA256

    ac59b8b99e3cf04746fb3954e69ed6335ccaea808c88ef09c5cee8b3adeea840

    SHA512

    a73683d27c5f07245f6413191f05e61e2b283afafd52203484817ac9cadbfb9e844c45d08147b6711d90e05e61e4b97b389120ab5eadd9ef9cf88d6af495445e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fdd748c022a08b10a7f8e53d3b081b5b

    SHA1

    8cae76fb79b9bc41f550ae4a035d213967df7761

    SHA256

    668594f4a2065373a47824e6b7d0f542a100b92f15f40b21a1681fe314c788f4

    SHA512

    28db5f501a15712b921695b30d68f46a3545d2db0e82c16521bb63e7123b9d3a4fe64e070ff774c50969828fe3ea9a1fffe79ff4f4933d31ea32a8d6482343f8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6ec9a3a3fda49dcfdfcb07a181c60b1a

    SHA1

    77693770c5c91a6f7f3cf1865632682948f14525

    SHA256

    933eb8330bd7011514fe330e0b2e9762351aed727de9d56af5b0170e152acdfd

    SHA512

    684091f14c919ff362e1e90d8860e6b5b8e6eb840d32993b0172da344053dd5b52822ead9536cd68bdd02ecebf7cdac70b5281eccc0e728bc6f3efc6ee697da1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5edff35a679d06dc98bdd6c180960b98

    SHA1

    66dea25dedf74bcc2cc925f0809ab4c32cf5cfa6

    SHA256

    89d92870ca0641191b963872657787fc6a9fef02085b7b718b1c9999b1192ae8

    SHA512

    a8992fc12e29ab734892d57f9e6e03fe4075906c1aee529826c15894d1d69fa0b8bcf1b89a3b8653eb20132e28b3a882b231d3767b0d2ecea5aac9a30150ab4a

  • C:\Users\Admin\AppData\Local\Temp\Cab234.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar247.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b